Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2023, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
Resource
win10v2004-20230220-en
General
-
Target
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe
-
Size
34KB
-
MD5
24b2856cb9840f3b7131827e32cb73c9
-
SHA1
306e69487143bb3756cba328f20aa55a3482c38c
-
SHA256
c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22
-
SHA512
8fef74742bca9faec30c144e9eec5e8fc4ac8f6d1fc1f680a2cf278c6511e6d1d11746e882a406b0cc2d79194a31c16e523930cc8f2866617c2f6232dc20b3e7
-
SSDEEP
768:b717qEQ4Un/guyq6tZ1f+escElzYcHeIm:b717Q4sDF6Z1mesbEI
Malware Config
Extracted
njrat
0.7d
HacKed
amazon.thedreamsop.com:2211
Microsoft® Windows® Operating System
-
reg_key
Microsoft® Windows® Operating System
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1516 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1468 explorer.exe 1796 explorer.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\Intel(R) Common User = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe\" .." explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe\" .." explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe Token: 33 1796 explorer.exe Token: SeIncBasePriorityPrivilege 1796 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1468 2032 c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe 28 PID 2032 wrote to memory of 1468 2032 c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe 28 PID 2032 wrote to memory of 1468 2032 c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe 28 PID 1468 wrote to memory of 1796 1468 explorer.exe 29 PID 1468 wrote to memory of 1796 1468 explorer.exe 29 PID 1468 wrote to memory of 1796 1468 explorer.exe 29 PID 1796 wrote to memory of 1516 1796 explorer.exe 30 PID 1796 wrote to memory of 1516 1796 explorer.exe 30 PID 1796 wrote to memory of 1516 1796 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe"C:\Users\Admin\AppData\Local\Temp\c688771d462dd43de49442bc6297db435c3138dddb7625e4d2fccb145463ac22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" "explorer.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD546f5111c7c871155091f0a7810b02235
SHA11a6e436333ba021e6971afd72c1ab880e3732308
SHA256c0ee79dfade9330fa524500595c9a3489be87d8017e18a1a3997991de761603a
SHA512538523ca4a06f824d3b8168107516e9bafefd54c21ec328c538be9323e1da2accb01f6fb8b6dfae5013e9f382f0159ed8c41ee491514adf5702aecf2ece5d870
-
Filesize
259KB
MD546f5111c7c871155091f0a7810b02235
SHA11a6e436333ba021e6971afd72c1ab880e3732308
SHA256c0ee79dfade9330fa524500595c9a3489be87d8017e18a1a3997991de761603a
SHA512538523ca4a06f824d3b8168107516e9bafefd54c21ec328c538be9323e1da2accb01f6fb8b6dfae5013e9f382f0159ed8c41ee491514adf5702aecf2ece5d870
-
Filesize
259KB
MD546f5111c7c871155091f0a7810b02235
SHA11a6e436333ba021e6971afd72c1ab880e3732308
SHA256c0ee79dfade9330fa524500595c9a3489be87d8017e18a1a3997991de761603a
SHA512538523ca4a06f824d3b8168107516e9bafefd54c21ec328c538be9323e1da2accb01f6fb8b6dfae5013e9f382f0159ed8c41ee491514adf5702aecf2ece5d870
-
Filesize
259KB
MD546f5111c7c871155091f0a7810b02235
SHA11a6e436333ba021e6971afd72c1ab880e3732308
SHA256c0ee79dfade9330fa524500595c9a3489be87d8017e18a1a3997991de761603a
SHA512538523ca4a06f824d3b8168107516e9bafefd54c21ec328c538be9323e1da2accb01f6fb8b6dfae5013e9f382f0159ed8c41ee491514adf5702aecf2ece5d870
-
Filesize
259KB
MD546f5111c7c871155091f0a7810b02235
SHA11a6e436333ba021e6971afd72c1ab880e3732308
SHA256c0ee79dfade9330fa524500595c9a3489be87d8017e18a1a3997991de761603a
SHA512538523ca4a06f824d3b8168107516e9bafefd54c21ec328c538be9323e1da2accb01f6fb8b6dfae5013e9f382f0159ed8c41ee491514adf5702aecf2ece5d870